* certificate then just pass through the connection and let the client
* verify the server certificate. */
if (global_passthrough_unknown) {
- char path[1024];
+ char path[TLSPROXY_MAX_PATH_LENGTH];
FILE *file = NULL;
if (-2 == server_certificate_file(&file, host, path, sizeof(path))) {
gnutls_certificate_credentials_t *x509_cred) {
int result;
int use_invalid_cert;
- char path[1024];
+ char path[TLSPROXY_MAX_PATH_LENGTH];
/* The "invalid" hostname is special. If it's used we send an invalid
* certificate to let the client know something is wrong. */
#include "log.h"
+/* Length for path arrays. */
+#define TLSPROXY_MAX_PATH_LENGTH 1024
/* Paths to necessary TLS files: the CA and the server key. */
#define PROXY_CA_FILE "proxy-ca.pem"